Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-37298 (GCVE-0-2024-37298)
Vulnerability from cvelistv5 – Published: 2024-07-01 18:27 – Updated: 2024-08-02 03:50- CWE-770 - Allocation of Resources Without Limits or Throttling
| URL | Tags |
|---|---|
| https://github.com/gorilla/schema/security/adviso… | x_refsource_CONFIRM |
| https://github.com/gorilla/schema/commit/cd59f2f1… | x_refsource_MISC |
| https://github.com/gorilla/schema/blob/main/decod… | x_refsource_MISC |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:gorillatoolkit:schema:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "schema",
"vendor": "gorillatoolkit",
"versions": [
{
"lessThan": "1.4.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-37298",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-02T14:16:14.834696Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-03T20:58:34.291Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T03:50:55.675Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3"
},
{
"name": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff"
},
{
"name": "https://github.com/gorilla/schema/blob/main/decoder.go#L223",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "schema",
"vendor": "gorilla",
"versions": [
{
"status": "affected",
"version": "\u003c 1.4.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770: Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-01T18:27:33.952Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3"
},
{
"name": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff"
},
{
"name": "https://github.com/gorilla/schema/blob/main/decoder.go#L223",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223"
}
],
"source": {
"advisory": "GHSA-3669-72x9-r9p3",
"discovery": "UNKNOWN"
},
"title": "Potential memory exhaustion attack due to sparse slice deserialization"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-37298",
"datePublished": "2024-07-01T18:27:33.952Z",
"dateReserved": "2024-06-05T20:10:46.496Z",
"dateUpdated": "2024-08-02T03:50:55.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-37298",
"date": "2026-05-20",
"epss": "0.00274",
"percentile": "0.50846"
},
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.\"}, {\"lang\": \"es\", \"value\": \"gorilla/schema convierte estructuras hacia y desde valores de formulario. Antes de la versi\\u00f3n 1.4.1 La ejecuci\\u00f3n de `schema.Decoder.Decode()` en una estructura que tiene un campo de tipo `[]struct{...}` la abre a ataques maliciosos relacionados con las asignaciones de memoria, aprovechando la escasez de memoria. funcionalidad de corte. Cualquier uso de `schema.Decoder.Decode()` en una estructura con matrices de otras estructuras podr\\u00eda ser vulnerable a esta vulnerabilidad de agotamiento de la memoria. La versi\\u00f3n 1.4.1 contiene un parche para el problema.\"}]",
"id": "CVE-2024-37298",
"lastModified": "2024-11-21T09:23:33.653",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-07-01T19:15:04.283",
"references": "[{\"url\": \"https://github.com/gorilla/schema/blob/main/decoder.go#L223\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/gorilla/schema/blob/main/decoder.go#L223\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-770\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-37298\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-07-01T19:15:04.283\",\"lastModified\":\"2024-11-21T09:23:33.653\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.\"},{\"lang\":\"es\",\"value\":\"gorilla/schema convierte estructuras hacia y desde valores de formulario. Antes de la versi\u00f3n 1.4.1 La ejecuci\u00f3n de `schema.Decoder.Decode()` en una estructura que tiene un campo de tipo `[]struct{...}` la abre a ataques maliciosos relacionados con las asignaciones de memoria, aprovechando la escasez de memoria. funcionalidad de corte. Cualquier uso de `schema.Decoder.Decode()` en una estructura con matrices de otras estructuras podr\u00eda ser vulnerable a esta vulnerabilidad de agotamiento de la memoria. La versi\u00f3n 1.4.1 contiene un parche para el problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"references\":[{\"url\":\"https://github.com/gorilla/schema/blob/main/decoder.go#L223\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/gorilla/schema/blob/main/decoder.go#L223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-37298\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-02T14:16:14.834696Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:gorillatoolkit:schema:*:*:*:*:*:*:*:*\"], \"vendor\": \"gorillatoolkit\", \"product\": \"schema\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.4.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-03T20:12:45.502Z\"}}], \"cna\": {\"title\": \"Potential memory exhaustion attack due to sparse slice deserialization\", \"source\": {\"advisory\": \"GHSA-3669-72x9-r9p3\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"gorilla\", \"product\": \"schema\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.4.1\"}]}], \"references\": [{\"url\": \"https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3\", \"name\": \"https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff\", \"name\": \"https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/gorilla/schema/blob/main/decoder.go#L223\", \"name\": \"https://github.com/gorilla/schema/blob/main/decoder.go#L223\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770: Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-07-01T18:27:33.952Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-37298\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-07-03T20:58:34.291Z\", \"dateReserved\": \"2024-06-05T20:10:46.496Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-07-01T18:27:33.952Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
alsa-2024:5258
Vulnerability from osv_almalinux
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
- golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)
- golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)
- golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
- golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)
- containers/image: digest type does not guarantee valid type (CVE-2024-3727)
- golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)
- go-retryablehttp: url might write sensitive information to log file (CVE-2024-6104)
- gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization (CVE-2024-37298)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "aardvark-dns"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1.10.0-1.module_el8.10.0+3792+03eaed9c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "aardvark-dns"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1.10.0-1.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "aardvark-dns"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1.10.0-1.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "buildah"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1.33.8-4.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "buildah-tests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1.33.8-4.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "cockpit-podman"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "84.1-1.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "conmon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3:2.1.10-1.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "conmon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3:2.1.10-1.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "conmon"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3:2.1.10-1.module_el8.10.0+3845+87b84552"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "container-selinux"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:2.229.0-2.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "containernetworking-plugins"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.4.0-5.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "containers-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1-82.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "crit"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18-5.module_el8.10.0+3845+87b84552"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "crit"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18-5.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "criu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18-5.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "criu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18-5.module_el8.10.0+3845+87b84552"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "criu-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18-5.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "criu-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18-5.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "criu-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18-5.module_el8.10.0+3845+87b84552"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "criu-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18-5.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "crun"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.14.3-2.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "crun"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.14.3-2.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fuse-overlayfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.13-1.module_el8.10.0+3859+6ae70a0e"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fuse-overlayfs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.13-1.module_el8.10.0+3792+03eaed9c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libslirp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.4.0-2.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libslirp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.4.0-2.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libslirp-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.4.0-2.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "libslirp-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.4.0-2.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netavark"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1.10.3-1.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "netavark"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1.10.3-1.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-seccomp-bpf-hook"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.10-1.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "oci-seccomp-bpf-hook"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.10-1.module_el8.10.0+3792+03eaed9c"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "podman"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-12.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "podman-catatonit"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-12.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "podman-docker"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-12.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "podman-gvproxy"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-12.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "podman-plugins"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-12.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "podman-remote"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-12.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "podman-tests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-12.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-criu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.18-5.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-podman"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.0-2.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "runc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1:1.1.12-4.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "skopeo"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1.14.5-3.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "skopeo-tests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:1.14.5-3.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "slirp4netns"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.3-1.module_el8.10.0+3845+87b84552"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "slirp4netns"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.3-1.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "slirp4netns"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.3-1.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "toolbox"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.99.5-2.module_el8.10.0+3845+87b84552"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "toolbox"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.99.5-2.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "toolbox"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.99.5-2.module_el8.10.0+3876+e55593a8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "toolbox-tests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.99.5-2.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "toolbox-tests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.99.5-2.module_el8.10.0+3845+87b84552"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "udica"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.6-21.module_el8.10.0+3858+6ad51f9f"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* golang-fips/openssl: Memory leaks in code encrypting and decrypting RSA payloads (CVE-2024-1394)\n* golang: net/http: memory exhaustion in Request.ParseMultipartForm (CVE-2023-45290)\n* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)\n* golang: net/mail: comments in display names are incorrectly handled (CVE-2024-24784)\n* containers/image: digest type does not guarantee valid type (CVE-2024-3727)\n* golang: archive/zip: Incorrect handling of certain ZIP files (CVE-2024-24789)\n* go-retryablehttp: url might write sensitive information to log file (CVE-2024-6104)\n* gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization (CVE-2024-37298)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2024:5258",
"modified": "2024-08-14T16:09:13Z",
"published": "2024-08-13T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:5258"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-45290"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-1394"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-24783"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-24784"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-24789"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-3727"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-37298"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-6104"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2262921"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2268017"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2268019"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2268021"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2274767"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2292668"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294000"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2295010"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-5258.html"
}
],
"related": [
"CVE-2024-1394",
"CVE-2023-45290",
"CVE-2024-24783",
"CVE-2024-24784",
"CVE-2024-3727",
"CVE-2024-24789",
"CVE-2024-6104",
"CVE-2024-37298"
],
"summary": "Important: container-tools:rhel8 security update"
}
alsa-2024:6194
Vulnerability from osv_almalinux
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
- golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)
- go-retryablehttp: url might write sensitive information to log file (CVE-2024-6104)
- gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization (CVE-2024-37298)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "podman"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-10.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "podman-docker"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-10.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "podman-plugins"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-10.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "podman-remote"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-10.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "podman-tests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4:4.9.4-10.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm (CVE-2024-24783)\n* go-retryablehttp: url might write sensitive information to log file (CVE-2024-6104)\n* gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization (CVE-2024-37298)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2024:6194",
"modified": "2024-09-04T08:19:33Z",
"published": "2024-09-03T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:6194"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-24783"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-37298"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-6104"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2268019"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294000"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2295010"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2024-6194.html"
}
],
"related": [
"CVE-2024-24783",
"CVE-2024-6104",
"CVE-2024-37298"
],
"summary": "Important: podman security update"
}
FKIE_CVE-2024-37298
Vulnerability from fkie_nvd - Published: 2024-07-01 19:15 - Updated: 2026-04-15 00:35| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/gorilla/schema/blob/main/decoder.go#L223 | ||
| security-advisories@github.com | https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff | ||
| security-advisories@github.com | https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/gorilla/schema/blob/main/decoder.go#L223 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue."
},
{
"lang": "es",
"value": "gorilla/schema convierte estructuras hacia y desde valores de formulario. Antes de la versi\u00f3n 1.4.1 La ejecuci\u00f3n de `schema.Decoder.Decode()` en una estructura que tiene un campo de tipo `[]struct{...}` la abre a ataques maliciosos relacionados con las asignaciones de memoria, aprovechando la escasez de memoria. funcionalidad de corte. Cualquier uso de `schema.Decoder.Decode()` en una estructura con matrices de otras estructuras podr\u00eda ser vulnerable a esta vulnerabilidad de agotamiento de la memoria. La versi\u00f3n 1.4.1 contiene un parche para el problema."
}
],
"id": "CVE-2024-37298",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-07-01T19:15:04.283",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
GHSA-3669-72X9-R9P3
Vulnerability from github – Published: 2024-07-01 20:35 – Updated: 2024-07-05 21:29Details
Running schema.Decoder.Decode() on a struct that has a field of type []struct{...} opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. For instance, in the Proof of Concept written below, someone can specify to set a field of the billionth element and it will allocate all other elements before it in the slice.
In the local environment environment for my project, I was able to call an endpoint like /innocent_endpoint?arr.10000000.X=1 and freeze my system from the memory allocation while parsing r.Form. I think this line is responsible for allocating the slice, although I haven't tested to make sure, so it's just an educated guess.
Proof of Concept
The following proof of concept works on both v1.2.0 and v1.2.1. I have not tested earlier versions.
package main
import (
"fmt"
"github.com/gorilla/schema"
)
func main() {
dec := schema.NewDecoder()
var result struct {
Arr []struct{ Val int }
}
if err := dec.Decode(&result, map[string][]string{"arr.1000000000.Val": {"1"}}); err != nil {
panic(err)
}
fmt.Printf("%#+v\n", result)
}
Impact
Any use of schema.Decoder.Decode() on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. There seems to be no possible solution that a developer using this library can do to disable this behaviour without fixing it in this project, so all uses of Decode that fall under this umbrella are affected. A fix that doesn't require a major change may also be harder to find, since it could break compatibility with some other intended use-cases.
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/gorilla/schema"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-37298"
],
"database_specific": {
"cwe_ids": [
"CWE-770"
],
"github_reviewed": true,
"github_reviewed_at": "2024-07-01T20:35:12Z",
"nvd_published_at": "2024-07-01T19:15:04Z",
"severity": "HIGH"
},
"details": "### Details\n\nRunning `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. For instance, in the Proof of Concept written below, someone can specify to set a field of the billionth element and it will allocate all other elements before it in the slice. \n\nIn the local environment environment for my project, I was able to call an endpoint like `/innocent_endpoint?arr.10000000.X=1` and freeze my system from the memory allocation while parsing `r.Form`. I think [this line](https://github.com/gorilla/schema/blob/main/decoder.go#L223) is responsible for allocating the slice, although I haven\u0027t tested to make sure, so it\u0027s just an educated guess.\n\n### Proof of Concept\n\nThe following proof of concept works on both v1.2.0 and v1.2.1. I have not tested earlier versions.\n\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/gorilla/schema\"\n)\n\nfunc main() {\n\tdec := schema.NewDecoder()\n\tvar result struct {\n\t\tArr []struct{ Val int }\n\t}\n\tif err := dec.Decode(\u0026result, map[string][]string{\"arr.1000000000.Val\": {\"1\"}}); err != nil {\n\t\tpanic(err)\n\t}\n\tfmt.Printf(\"%#+v\\n\", result)\n}\n\n```\n\n### Impact\n\nAny use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. There seems to be no possible solution that a developer using this library can do to disable this behaviour without fixing it in this project, so all uses of Decode that fall under this umbrella are affected. A fix that doesn\u0027t require a major change may also be harder to find, since it could break compatibility with some other intended use-cases.\n",
"id": "GHSA-3669-72x9-r9p3",
"modified": "2024-07-05T21:29:07Z",
"published": "2024-07-01T20:35:12Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37298"
},
{
"type": "WEB",
"url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff"
},
{
"type": "PACKAGE",
"url": "https://github.com/gorilla/schema"
},
{
"type": "WEB",
"url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
],
"summary": "Potential memory exhaustion attack due to sparse slice deserialization"
}
MSRC_CVE-2024-37298
Vulnerability from csaf_microsoft - Published: 2024-07-01 07:00 - Updated: 2026-02-18 01:13| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17284-17086 | — | ||
| Unresolved product id: 17285-17086 | — | ||
| Unresolved product id: 17699-17084 | — | ||
| Unresolved product id: 17700-17084 | — | ||
| Unresolved product id: 19792-17086 | — | ||
| Unresolved product id: 19343-17084 | — | ||
| Unresolved product id: 17793-17084 | — | ||
| Unresolved product id: 19735-17086 | — | ||
| Unresolved product id: 19437-17086 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17086-9 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17086-8 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-7 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-6 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17086-1 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-4 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-5 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17086-2 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17086-3 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2024/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2024/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37298 Potential memory exhaustion attack due to sparse slice deserialization - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-37298.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Potential memory exhaustion attack due to sparse slice deserialization",
"tracking": {
"current_release_date": "2026-02-18T01:13:12.000Z",
"generator": {
"date": "2026-02-18T10:54:58.515Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-37298",
"initial_release_date": "2024-07-01T07:00:00.000Z",
"revision_history": [
{
"date": "2024-07-19T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-08-05T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2024-08-29T00:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
},
{
"date": "2024-08-30T00:00:00.000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Information published."
},
{
"date": "2024-08-31T00:00:00.000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Information published."
},
{
"date": "2024-09-01T00:00:00.000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Information published."
},
{
"date": "2024-09-02T00:00:00.000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Information published."
},
{
"date": "2024-09-03T00:00:00.000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Information published."
},
{
"date": "2024-09-05T00:00:00.000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Information published."
},
{
"date": "2024-09-06T00:00:00.000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Information published."
},
{
"date": "2024-09-07T00:00:00.000Z",
"legacy_version": "2",
"number": "11",
"summary": "Information published."
},
{
"date": "2024-09-08T00:00:00.000Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Information published."
},
{
"date": "2024-09-11T00:00:00.000Z",
"legacy_version": "2.2",
"number": "13",
"summary": "Information published."
},
{
"date": "2026-02-18T01:13:12.000Z",
"legacy_version": "3",
"number": "14",
"summary": "Information published."
}
],
"status": "final",
"version": "14"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 telegraf 1.29.4-7",
"product": {
"name": "\u003ccbl2 telegraf 1.29.4-7",
"product_id": "9"
}
},
{
"category": "product_version",
"name": "cbl2 telegraf 1.29.4-7",
"product": {
"name": "cbl2 telegraf 1.29.4-7",
"product_id": "17284"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 telegraf 1.31.0-2",
"product": {
"name": "\u003cazl3 telegraf 1.31.0-2",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "azl3 telegraf 1.31.0-2",
"product": {
"name": "azl3 telegraf 1.31.0-2",
"product_id": "17700"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 telegraf 1.31.0-10",
"product": {
"name": "\u003cazl3 telegraf 1.31.0-10",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "azl3 telegraf 1.31.0-10",
"product": {
"name": "azl3 telegraf 1.31.0-10",
"product_id": "19343"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 telegraf 1.29.4-15",
"product": {
"name": "\u003ccbl2 telegraf 1.29.4-15",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 telegraf 1.29.4-15",
"product": {
"name": "cbl2 telegraf 1.29.4-15",
"product_id": "19735"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 telegraf 1.29.4-15",
"product": {
"name": "\u003ccbl2 telegraf 1.29.4-15",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cbl2 telegraf 1.29.4-15",
"product": {
"name": "cbl2 telegraf 1.29.4-15",
"product_id": "19437"
}
}
],
"category": "product_name",
"name": "telegraf"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 libcontainers-common 20210626-4",
"product": {
"name": "\u003ccbl2 libcontainers-common 20210626-4",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "cbl2 libcontainers-common 20210626-4",
"product": {
"name": "cbl2 libcontainers-common 20210626-4",
"product_id": "17285"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 libcontainers-common 20240213-2",
"product": {
"name": "\u003cazl3 libcontainers-common 20240213-2",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "azl3 libcontainers-common 20240213-2",
"product": {
"name": "azl3 libcontainers-common 20240213-2",
"product_id": "17699"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 libcontainers-common 20210626-7",
"product": {
"name": "\u003ccbl2 libcontainers-common 20210626-7",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 libcontainers-common 20210626-7",
"product": {
"name": "cbl2 libcontainers-common 20210626-7",
"product_id": "19792"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 libcontainers-common 20240213-3",
"product": {
"name": "\u003cazl3 libcontainers-common 20240213-3",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "azl3 libcontainers-common 20240213-3",
"product": {
"name": "azl3 libcontainers-common 20240213-3",
"product_id": "17793"
}
}
],
"category": "product_name",
"name": "libcontainers-common"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 telegraf 1.29.4-7 as a component of CBL Mariner 2.0",
"product_id": "17086-9"
},
"product_reference": "9",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 telegraf 1.29.4-7 as a component of CBL Mariner 2.0",
"product_id": "17284-17086"
},
"product_reference": "17284",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libcontainers-common 20210626-4 as a component of CBL Mariner 2.0",
"product_id": "17086-8"
},
"product_reference": "8",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libcontainers-common 20210626-4 as a component of CBL Mariner 2.0",
"product_id": "17285-17086"
},
"product_reference": "17285",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 libcontainers-common 20240213-2 as a component of Azure Linux 3.0",
"product_id": "17084-7"
},
"product_reference": "7",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libcontainers-common 20240213-2 as a component of Azure Linux 3.0",
"product_id": "17699-17084"
},
"product_reference": "17699",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 telegraf 1.31.0-2 as a component of Azure Linux 3.0",
"product_id": "17084-6"
},
"product_reference": "6",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 telegraf 1.31.0-2 as a component of Azure Linux 3.0",
"product_id": "17700-17084"
},
"product_reference": "17700",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libcontainers-common 20210626-7 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libcontainers-common 20210626-7 as a component of CBL Mariner 2.0",
"product_id": "19792-17086"
},
"product_reference": "19792",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 telegraf 1.31.0-10 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 telegraf 1.31.0-10 as a component of Azure Linux 3.0",
"product_id": "19343-17084"
},
"product_reference": "19343",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 libcontainers-common 20240213-3 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libcontainers-common 20240213-3 as a component of Azure Linux 3.0",
"product_id": "17793-17084"
},
"product_reference": "17793",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 telegraf 1.29.4-15 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 telegraf 1.29.4-15 as a component of CBL Mariner 2.0",
"product_id": "19735-17086"
},
"product_reference": "19735",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 telegraf 1.29.4-15 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 telegraf 1.29.4-15 as a component of CBL Mariner 2.0",
"product_id": "19437-17086"
},
"product_reference": "19437",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37298",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17284-17086",
"17285-17086",
"17699-17084",
"17700-17084",
"19792-17086",
"19343-17084",
"17793-17084",
"19735-17086",
"19437-17086"
],
"known_affected": [
"17086-9",
"17086-8",
"17084-7",
"17084-6",
"17086-1",
"17084-4",
"17084-5",
"17086-2",
"17086-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37298 Potential memory exhaustion attack due to sparse slice deserialization - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-37298.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-19T00:00:00.000Z",
"details": "1.29.4-7:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-9",
"17086-2",
"17086-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-07-19T00:00:00.000Z",
"details": "20210626-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-8",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-07-19T00:00:00.000Z",
"details": "20240213-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-7",
"17084-5"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2024-07-19T00:00:00.000Z",
"details": "1.31.0-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-6",
"17084-4"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-9",
"17086-8",
"17084-7",
"17084-6",
"17086-1",
"17084-4",
"17084-5",
"17086-2",
"17086-3"
]
}
],
"title": "Potential memory exhaustion attack due to sparse slice deserialization"
}
]
}
NCSC-2024-0339
Vulnerability from csaf_ncscnl - Published: 2024-08-13 18:23 - Updated: 2024-08-13 18:23| URL | Category |
|---|---|
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2019… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2021… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2021… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2021… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2021… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2023… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2023… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2023… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2023… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2019… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2021… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2007… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2019… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2017… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2019… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2021… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2017… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2021… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2023… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2022… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Mariner (Azure Linux).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden betreffen oudere kwetsbaarheden in diverse subcomponenten van de distro, zoals Python, Emacs, Qemu, Django, Curl, wget etc. welke in de nieuwe versie zijn verholpen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Partial String Comparison",
"title": "CWE-187"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Off-by-one Error",
"title": "CWE-193"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "general",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Improper Check for Certificate Revocation",
"title": "CWE-299"
},
{
"category": "general",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "general",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
"title": "CWE-95"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Mariner",
"tracking": {
"current_release_date": "2024-08-13T18:23:22.271316Z",
"id": "NCSC-2024-0339",
"initial_release_date": "2024-08-13T18:23:22.271316Z",
"revision_history": [
{
"date": "2024-08-13T18:23:22.271316Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cbl-mariner",
"product": {
"name": "cbl-mariner",
"product_id": "CSAFPID-1489521",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2601",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-2601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json"
}
],
"title": "CVE-2022-2601"
},
{
"cve": "CVE-2022-3775",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3775",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3775.json"
}
],
"title": "CVE-2022-3775"
},
{
"cve": "CVE-2022-36648",
"references": [
{
"category": "self",
"summary": "CVE-2022-36648",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36648.json"
}
],
"title": "CVE-2022-36648"
},
{
"cve": "CVE-2019-3833",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2019-3833",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3833.json"
}
],
"title": "CVE-2019-3833"
},
{
"cve": "CVE-2021-3929",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-3929",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3929.json"
}
],
"title": "CVE-2021-3929"
},
{
"cve": "CVE-2021-4158",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-4158",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4158.json"
}
],
"title": "CVE-2021-4158"
},
{
"cve": "CVE-2021-4206",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-4206",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4206.json"
}
],
"title": "CVE-2021-4206"
},
{
"cve": "CVE-2021-4207",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-4207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4207.json"
}
],
"title": "CVE-2021-4207"
},
{
"cve": "CVE-2022-26353",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-26353",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26353.json"
}
],
"title": "CVE-2022-26353"
},
{
"cve": "CVE-2022-35414",
"references": [
{
"category": "self",
"summary": "CVE-2022-35414",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-35414.json"
}
],
"title": "CVE-2022-35414"
},
{
"cve": "CVE-2023-3354",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-3354",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3354.json"
}
],
"title": "CVE-2023-3354"
},
{
"cve": "CVE-2022-3872",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"notes": [
{
"category": "other",
"text": "Off-by-one Error",
"title": "CWE-193"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3872",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3872.json"
}
],
"title": "CVE-2022-3872"
},
{
"cve": "CVE-2022-4144",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-4144",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4144.json"
}
],
"title": "CVE-2022-4144"
},
{
"cve": "CVE-2023-45288",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-45288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
}
],
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-29404",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-29404",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29404.json"
}
],
"title": "CVE-2023-29404"
},
{
"cve": "CVE-2023-29402",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-29402",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29402.json"
}
],
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2019-3816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2019-3816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3816.json"
}
],
"title": "CVE-2019-3816"
},
{
"cve": "CVE-2021-3750",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-3750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3750.json"
}
],
"title": "CVE-2021-3750"
},
{
"cve": "CVE-2022-0358",
"cwe": {
"id": "CWE-273",
"name": "Improper Check for Dropped Privileges"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-0358",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0358.json"
}
],
"title": "CVE-2022-0358"
},
{
"cve": "CVE-2022-26354",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-26354",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26354.json"
}
],
"title": "CVE-2022-26354"
},
{
"cve": "CVE-2022-3165",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-3165",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3165.json"
}
],
"title": "CVE-2022-3165"
},
{
"cve": "CVE-2022-2962",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-2962",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2962.json"
}
],
"title": "CVE-2022-2962"
},
{
"cve": "CVE-2022-41722",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-41722",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41722.json"
}
],
"title": "CVE-2022-41722"
},
{
"cve": "CVE-2022-29526",
"cwe": {
"id": "CWE-280",
"name": "Improper Handling of Insufficient Permissions or Privileges "
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Insufficient Permissions or Privileges ",
"title": "CWE-280"
},
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2022-29526",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-29526.json"
}
],
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2007-4559",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2007-4559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2007/CVE-2007-4559.json"
}
],
"title": "CVE-2007-4559"
},
{
"cve": "CVE-2019-9674",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2019-9674",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-9674.json"
}
],
"title": "CVE-2019-9674"
},
{
"cve": "CVE-2017-18207",
"references": [
{
"category": "self",
"summary": "CVE-2017-18207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-18207.json"
}
],
"title": "CVE-2017-18207"
},
{
"cve": "CVE-2019-20907",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2019-20907",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-20907.json"
}
],
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2021-23336",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-23336",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23336.json"
}
],
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2017-17522",
"references": [
{
"category": "self",
"summary": "CVE-2017-17522",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-17522.json"
}
],
"title": "CVE-2017-17522"
},
{
"cve": "CVE-2024-6655",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6655",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6655.json"
}
],
"title": "CVE-2024-6655"
},
{
"cve": "CVE-2024-2466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
}
],
"title": "CVE-2024-2466"
},
{
"cve": "CVE-2024-39331",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "other",
"text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
"title": "CWE-95"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39331",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39331.json"
}
],
"title": "CVE-2024-39331"
},
{
"cve": "CVE-2021-43565",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2021-43565",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-43565.json"
}
],
"title": "CVE-2021-43565"
},
{
"cve": "CVE-2024-39277",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39277",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39277.json"
}
],
"title": "CVE-2024-39277"
},
{
"cve": "CVE-2024-38780",
"cwe": {
"id": "CWE-371",
"name": "-"
},
"notes": [
{
"category": "other",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38780",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38780.json"
}
],
"title": "CVE-2024-38780"
},
{
"cve": "CVE-2024-39292",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39292",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39292.json"
}
],
"title": "CVE-2024-39292"
},
{
"cve": "CVE-2024-39482",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39482",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39482.json"
}
],
"title": "CVE-2024-39482"
},
{
"cve": "CVE-2024-39484",
"references": [
{
"category": "self",
"summary": "CVE-2024-39484",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39484.json"
}
],
"title": "CVE-2024-39484"
},
{
"cve": "CVE-2024-39495",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39495",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39495.json"
}
],
"title": "CVE-2024-39495"
},
{
"cve": "CVE-2024-40902",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-40902",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40902.json"
}
],
"title": "CVE-2024-40902"
},
{
"cve": "CVE-2024-41110",
"cwe": {
"id": "CWE-187",
"name": "Partial String Comparison"
},
"notes": [
{
"category": "other",
"text": "Partial String Comparison",
"title": "CWE-187"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-41110",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41110.json"
}
],
"title": "CVE-2024-41110"
},
{
"cve": "CVE-2024-37298",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37298",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37298.json"
}
],
"title": "CVE-2024-37298"
},
{
"cve": "CVE-2024-0397",
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-38571",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38571",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38571.json"
}
],
"title": "CVE-2024-38571"
},
{
"cve": "CVE-2024-42077",
"references": [
{
"category": "self",
"summary": "CVE-2024-42077",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42077.json"
}
],
"title": "CVE-2024-42077"
},
{
"cve": "CVE-2024-39473",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39473",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39473.json"
}
],
"title": "CVE-2024-39473"
},
{
"cve": "CVE-2024-26900",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26900",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26900.json"
}
],
"title": "CVE-2024-26900"
},
{
"cve": "CVE-2024-39474",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39474",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39474.json"
}
],
"title": "CVE-2024-39474"
},
{
"cve": "CVE-2024-42073",
"references": [
{
"category": "self",
"summary": "CVE-2024-42073",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42073.json"
}
],
"title": "CVE-2024-42073"
},
{
"cve": "CVE-2024-42074",
"references": [
{
"category": "self",
"summary": "CVE-2024-42074",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42074.json"
}
],
"title": "CVE-2024-42074"
},
{
"cve": "CVE-2024-42075",
"references": [
{
"category": "self",
"summary": "CVE-2024-42075",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42075.json"
}
],
"title": "CVE-2024-42075"
},
{
"cve": "CVE-2024-42078",
"references": [
{
"category": "self",
"summary": "CVE-2024-42078",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42078.json"
}
],
"title": "CVE-2024-42078"
},
{
"cve": "CVE-2024-0853",
"cwe": {
"id": "CWE-299",
"name": "Improper Check for Certificate Revocation"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Certificate Revocation",
"title": "CWE-299"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-0853",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0853.json"
}
],
"title": "CVE-2024-0853"
},
{
"cve": "CVE-2024-2004",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Cleartext Transmission of Sensitive Information",
"title": "CWE-319"
},
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2004",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
}
],
"title": "CVE-2024-2004"
},
{
"cve": "CVE-2024-2398",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-2398",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
}
],
"title": "CVE-2024-2398"
},
{
"cve": "CVE-2024-38662",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38662",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38662.json"
}
],
"title": "CVE-2024-38662"
},
{
"cve": "CVE-2024-36288",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-36288",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36288.json"
}
],
"title": "CVE-2024-36288"
},
{
"cve": "CVE-2024-39480",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39480",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39480.json"
}
],
"title": "CVE-2024-39480"
},
{
"cve": "CVE-2024-39476",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "other",
"text": "Deadlock",
"title": "CWE-833"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39476",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39476.json"
}
],
"title": "CVE-2024-39476"
},
{
"cve": "CVE-2024-39475",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "other",
"text": "Divide By Zero",
"title": "CWE-369"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39475.json"
}
],
"title": "CVE-2024-39475"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-26461",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-26461",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26461.json"
}
],
"title": "CVE-2024-26461"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-6104",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6104",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6104.json"
}
],
"title": "CVE-2024-6104"
},
{
"cve": "CVE-2024-6257",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6257.json"
}
],
"title": "CVE-2024-6257"
},
{
"cve": "CVE-2024-23722",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-23722",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23722.json"
}
],
"title": "CVE-2024-23722"
},
{
"cve": "CVE-2024-40898",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-40898",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
}
],
"title": "CVE-2024-40898"
},
{
"cve": "CVE-2024-38583",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38583",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38583.json"
}
],
"title": "CVE-2024-38583"
},
{
"cve": "CVE-2024-39493",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39493",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39493.json"
}
],
"title": "CVE-2024-39493"
},
{
"cve": "CVE-2024-42068",
"references": [
{
"category": "self",
"summary": "CVE-2024-42068",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42068.json"
}
],
"title": "CVE-2024-42068"
},
{
"cve": "CVE-2024-39489",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39489",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39489.json"
}
],
"title": "CVE-2024-39489"
},
{
"cve": "CVE-2024-42070",
"references": [
{
"category": "self",
"summary": "CVE-2024-42070",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42070.json"
}
],
"title": "CVE-2024-42070"
},
{
"cve": "CVE-2024-42076",
"references": [
{
"category": "self",
"summary": "CVE-2024-42076",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42076.json"
}
],
"title": "CVE-2024-42076"
},
{
"cve": "CVE-2024-42080",
"references": [
{
"category": "self",
"summary": "CVE-2024-42080",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42080.json"
}
],
"title": "CVE-2024-42080"
},
{
"cve": "CVE-2024-38428",
"cwe": {
"id": "CWE-115",
"name": "Misinterpretation of Input"
},
"notes": [
{
"category": "other",
"text": "Misinterpretation of Input",
"title": "CWE-115"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38428",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38428.json"
}
],
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-42082",
"references": [
{
"category": "self",
"summary": "CVE-2024-42082",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42082.json"
}
],
"title": "CVE-2024-42082"
},
{
"cve": "CVE-2022-48788",
"references": [
{
"category": "self",
"summary": "CVE-2022-48788",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48788.json"
}
],
"title": "CVE-2022-48788"
},
{
"cve": "CVE-2023-52340",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-52340",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52340.json"
}
],
"title": "CVE-2023-52340"
},
{
"cve": "CVE-2022-48841",
"references": [
{
"category": "self",
"summary": "CVE-2022-48841",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48841.json"
}
],
"title": "CVE-2022-48841"
},
{
"cve": "CVE-2024-39485",
"references": [
{
"category": "self",
"summary": "CVE-2024-39485",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39485.json"
}
],
"title": "CVE-2024-39485"
},
{
"cve": "CVE-2024-39483",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
"title": "CWE-74"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39483",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39483.json"
}
],
"title": "CVE-2024-39483"
},
{
"cve": "CVE-2024-42071",
"references": [
{
"category": "self",
"summary": "CVE-2024-42071",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42071.json"
}
],
"title": "CVE-2024-42071"
},
{
"cve": "CVE-2024-42072",
"references": [
{
"category": "self",
"summary": "CVE-2024-42072",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42072.json"
}
],
"title": "CVE-2024-42072"
},
{
"cve": "CVE-2024-42237",
"references": [
{
"category": "self",
"summary": "CVE-2024-42237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42237.json"
}
],
"title": "CVE-2024-42237"
},
{
"cve": "CVE-2024-42083",
"references": [
{
"category": "self",
"summary": "CVE-2024-42083",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42083.json"
}
],
"title": "CVE-2024-42083"
}
]
}
OPENSUSE-SU-2025:14663-1
Vulnerability from csaf_opensuse - Published: 2025-01-17 00:00 - Updated: 2025-01-17 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://www.suse.com/security/cve/CVE-2023-1732/ | self |
| https://www.suse.com/security/cve/CVE-2023-44270/ | self |
| https://www.suse.com/security/cve/CVE-2023-45133/ | self |
| https://www.suse.com/security/cve/CVE-2023-45683/ | self |
| https://www.suse.com/security/cve/CVE-2023-46234/ | self |
| https://www.suse.com/security/cve/CVE-2024-21538/ | self |
| https://www.suse.com/security/cve/CVE-2024-23331/ | self |
| https://www.suse.com/security/cve/CVE-2024-24786/ | self |
| https://www.suse.com/security/cve/CVE-2024-28180/ | self |
| https://www.suse.com/security/cve/CVE-2024-31207/ | self |
| https://www.suse.com/security/cve/CVE-2024-37298/ | self |
| https://www.suse.com/security/cve/CVE-2024-4067/ | self |
| https://www.suse.com/security/cve/CVE-2024-4068/ | self |
| https://www.suse.com/security/cve/CVE-2024-42459/ | self |
| https://www.suse.com/security/cve/CVE-2024-42460/ | self |
| https://www.suse.com/security/cve/CVE-2024-42461/ | self |
| https://www.suse.com/security/cve/CVE-2024-45296/ | self |
| https://www.suse.com/security/cve/CVE-2024-45338/ | self |
| https://www.suse.com/security/cve/CVE-2024-45811/ | self |
| https://www.suse.com/security/cve/CVE-2024-45812/ | self |
| https://www.suse.com/security/cve/CVE-2024-47068/ | self |
| https://www.suse.com/security/cve/CVE-2024-47875/ | self |
| https://www.suse.com/security/cve/CVE-2024-48948/ | self |
| https://www.suse.com/security/cve/CVE-2024-48949/ | self |
| https://www.suse.com/security/cve/CVE-2024-51744/ | self |
| https://www.suse.com/security/cve/CVE-2024-55565/ | self |
| https://www.suse.com/security/cve/CVE-2024-6104/ | self |
| https://www.suse.com/security/cve/CVE-2023-1732 | external |
| https://www.suse.com/security/cve/CVE-2023-44270 | external |
| https://www.suse.com/security/cve/CVE-2023-45133 | external |
| https://www.suse.com/security/cve/CVE-2023-45683 | external |
| https://bugzilla.suse.com/1216308 | external |
| https://www.suse.com/security/cve/CVE-2023-46234 | external |
| https://www.suse.com/security/cve/CVE-2024-21538 | external |
| https://bugzilla.suse.com/1233843 | external |
| https://www.suse.com/security/cve/CVE-2024-23331 | external |
| https://www.suse.com/security/cve/CVE-2024-24786 | external |
| https://bugzilla.suse.com/1226136 | external |
| https://www.suse.com/security/cve/CVE-2024-28180 | external |
| https://bugzilla.suse.com/1234984 | external |
| https://www.suse.com/security/cve/CVE-2024-31207 | external |
| https://www.suse.com/security/cve/CVE-2024-37298 | external |
| https://bugzilla.suse.com/1227309 | external |
| https://www.suse.com/security/cve/CVE-2024-4067 | external |
| https://bugzilla.suse.com/1224255 | external |
| https://www.suse.com/security/cve/CVE-2024-4068 | external |
| https://bugzilla.suse.com/1224256 | external |
| https://www.suse.com/security/cve/CVE-2024-42459 | external |
| https://bugzilla.suse.com/1232538 | external |
| https://www.suse.com/security/cve/CVE-2024-42460 | external |
| https://bugzilla.suse.com/1232538 | external |
| https://www.suse.com/security/cve/CVE-2024-42461 | external |
| https://bugzilla.suse.com/1232538 | external |
| https://www.suse.com/security/cve/CVE-2024-45296 | external |
| https://www.suse.com/security/cve/CVE-2024-45338 | external |
| https://bugzilla.suse.com/1234794 | external |
| https://www.suse.com/security/cve/CVE-2024-45811 | external |
| https://www.suse.com/security/cve/CVE-2024-45812 | external |
| https://www.suse.com/security/cve/CVE-2024-47068 | external |
| https://www.suse.com/security/cve/CVE-2024-47875 | external |
| https://bugzilla.suse.com/1231571 | external |
| https://www.suse.com/security/cve/CVE-2024-48948 | external |
| https://bugzilla.suse.com/1231681 | external |
| https://www.suse.com/security/cve/CVE-2024-48949 | external |
| https://bugzilla.suse.com/1231557 | external |
| https://www.suse.com/security/cve/CVE-2024-51744 | external |
| https://bugzilla.suse.com/1232936 | external |
| https://www.suse.com/security/cve/CVE-2024-55565 | external |
| https://www.suse.com/security/cve/CVE-2024-6104 | external |
| https://bugzilla.suse.com/1227024 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "velociraptor-0.7.0.4.git142.862ef23-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the velociraptor-0.7.0.4.git142.862ef23-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-14663",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14663-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:14663-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:14663-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1732 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-44270 page",
"url": "https://www.suse.com/security/cve/CVE-2023-44270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45133 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45683 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-46234 page",
"url": "https://www.suse.com/security/cve/CVE-2023-46234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-21538 page",
"url": "https://www.suse.com/security/cve/CVE-2024-21538/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-23331 page",
"url": "https://www.suse.com/security/cve/CVE-2024-23331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24786 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-28180 page",
"url": "https://www.suse.com/security/cve/CVE-2024-28180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-31207 page",
"url": "https://www.suse.com/security/cve/CVE-2024-31207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37298 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37298/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4067 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4068 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42459 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42459/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42460 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42460/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42461 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42461/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-45296 page",
"url": "https://www.suse.com/security/cve/CVE-2024-45296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-45338 page",
"url": "https://www.suse.com/security/cve/CVE-2024-45338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-45811 page",
"url": "https://www.suse.com/security/cve/CVE-2024-45811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-45812 page",
"url": "https://www.suse.com/security/cve/CVE-2024-45812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47068 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47875 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47875/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-48948 page",
"url": "https://www.suse.com/security/cve/CVE-2024-48948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-48949 page",
"url": "https://www.suse.com/security/cve/CVE-2024-48949/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-51744 page",
"url": "https://www.suse.com/security/cve/CVE-2024-51744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-55565 page",
"url": "https://www.suse.com/security/cve/CVE-2024-55565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-6104 page",
"url": "https://www.suse.com/security/cve/CVE-2024-6104/"
}
],
"title": "velociraptor-0.7.0.4.git142.862ef23-1.1 on GA media",
"tracking": {
"current_release_date": "2025-01-17T00:00:00Z",
"generator": {
"date": "2025-01-17T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:14663-1",
"initial_release_date": "2025-01-17T00:00:00Z",
"revision_history": [
{
"date": "2025-01-17T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"product": {
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"product_id": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"product": {
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"product_id": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"product": {
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"product_id": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64",
"product": {
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64",
"product_id": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64"
},
"product_reference": "velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le"
},
"product_reference": "velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x"
},
"product_reference": "velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
},
"product_reference": "velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-1732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1732"
}
],
"notes": [
{
"category": "general",
"text": "When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.\n\nThe tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1732",
"url": "https://www.suse.com/security/cve/CVE-2023-1732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-1732"
},
{
"cve": "CVE-2023-44270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-44270"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in PostCSS before 8.4.31. The vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being included in a comment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-44270",
"url": "https://www.suse.com/security/cve/CVE-2023-44270"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-44270"
},
{
"cve": "CVE-2023-45133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45133"
}
],
"notes": [
{
"category": "general",
"text": "Babel is a compiler for writingJavaScript. In `@babel/traverse` prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of `babel-traverse`, using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods. Known affected plugins are `@babel/plugin-transform-runtime`; `@babel/preset-env` when using its `useBuiltIns` option; and any \"polyfill provider\" plugin that depends on `@babel/helper-define-polyfill-provider`, such as `babel-plugin-polyfill-corejs3`, `babel-plugin-polyfill-corejs2`, `babel-plugin-polyfill-es-shims`, `babel-plugin-polyfill-regenerator`. No other plugins under the `@babel/` namespace are impacted, but third-party plugins might be. Users that only compile trusted code are not impacted. The vulnerability has been fixed in `@babel/traverse@7.23.2` and `@babel/traverse@8.0.0-alpha.4`. Those who cannot upgrade `@babel/traverse` and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected `@babel/traverse` versions: `@babel/plugin-transform-runtime` v7.23.2, `@babel/preset-env` v7.23.2, `@babel/helper-define-polyfill-provider` v0.4.3, `babel-plugin-polyfill-corejs2` v0.4.6, `babel-plugin-polyfill-corejs3` v0.8.5, `babel-plugin-polyfill-es-shims` v0.10.0, `babel-plugin-polyfill-regenerator` v0.5.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45133",
"url": "https://www.suse.com/security/cve/CVE-2023-45133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2023-45133"
},
{
"cve": "CVE-2023-45683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45683"
}
],
"notes": [
{
"category": "general",
"text": "github.com/crewjam/saml is a saml library for the go language. In affected versions the package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim\u0027s browser loaded the SAML IdP initiated SSO link for the malicious service provider. Note: SP registration is commonly an unrestricted operation in IdPs, hence not requiring particular permissions or publicly accessible to ease the IdP interoperability. This issue is fixed in version 0.4.14. Users unable to upgrade may perform external validation of URLs provided in SAML metadata, or restrict the ability for end-users to upload arbitrary metadata.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45683",
"url": "https://www.suse.com/security/cve/CVE-2023-45683"
},
{
"category": "external",
"summary": "SUSE Bug 1216308 for CVE-2023-45683",
"url": "https://bugzilla.suse.com/1216308"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-45683"
},
{
"cve": "CVE-2023-46234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-46234"
}
],
"notes": [
{
"category": "general",
"text": "browserify-sign is a package to duplicate the functionality of node\u0027s crypto public key functions, much of this is based on Fedor Indutny\u0027s work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-46234",
"url": "https://www.suse.com/security/cve/CVE-2023-46234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-46234"
},
{
"cve": "CVE-2024-21538",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-21538"
}
],
"notes": [
{
"category": "general",
"text": "Versions of the package cross-spawn before 6.0.6, from 7.0.0 and before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-21538",
"url": "https://www.suse.com/security/cve/CVE-2024-21538"
},
{
"category": "external",
"summary": "SUSE Bug 1233843 for CVE-2024-21538",
"url": "https://bugzilla.suse.com/1233843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-21538"
},
{
"cve": "CVE-2024-23331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-23331"
}
],
"notes": [
{
"category": "general",
"text": "Vite is a frontend tooling framework for javascript. The Vite dev server option `server.fs.deny` can be bypassed on case-insensitive file systems using case-augmented versions of filenames. Notably this affects servers hosted on Windows. This bypass is similar to CVE-2023-34092 -- with surface area reduced to hosts having case-insensitive filesystems. Since `picomatch` defaults to case-sensitive glob matching, but the file server doesn\u0027t discriminate; a blacklist bypass is possible. By requesting raw filesystem paths using augmented casing, the matcher derived from `config.server.fs.deny` fails to block access to sensitive files. This issue has been addressed in vite@5.0.12, vite@4.5.2, vite@3.2.8, and vite@2.9.17. Users are advised to upgrade. Users unable to upgrade should restrict access to dev servers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-23331",
"url": "https://www.suse.com/security/cve/CVE-2024-23331"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-23331"
},
{
"cve": "CVE-2024-24786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24786"
}
],
"notes": [
{
"category": "general",
"text": "The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24786",
"url": "https://www.suse.com/security/cve/CVE-2024-24786"
},
{
"category": "external",
"summary": "SUSE Bug 1226136 for CVE-2024-24786",
"url": "https://bugzilla.suse.com/1226136"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-28180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-28180"
}
],
"notes": [
{
"category": "general",
"text": "Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-28180",
"url": "https://www.suse.com/security/cve/CVE-2024-28180"
},
{
"category": "external",
"summary": "SUSE Bug 1234984 for CVE-2024-28180",
"url": "https://bugzilla.suse.com/1234984"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-28180"
},
{
"cve": "CVE-2024-31207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-31207"
}
],
"notes": [
{
"category": "general",
"text": "Vite (French word for \"quick\", pronounced /vit/, like \"veet\") is a frontend build tooling to improve the frontend development experience.`server.fs.deny` does not deny requests for patterns with directories. This vulnerability has been patched in version(s) 5.2.6, 5.1.7, 5.0.13, 4.5.3, 3.2.10 and 2.9.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-31207",
"url": "https://www.suse.com/security/cve/CVE-2024-31207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-31207"
},
{
"cve": "CVE-2024-37298",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37298"
}
],
"notes": [
{
"category": "general",
"text": "gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37298",
"url": "https://www.suse.com/security/cve/CVE-2024-37298"
},
{
"category": "external",
"summary": "SUSE Bug 1227309 for CVE-2024-37298",
"url": "https://bugzilla.suse.com/1227309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-37298"
},
{
"cve": "CVE-2024-4067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4067"
}
],
"notes": [
{
"category": "general",
"text": "The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn\u0027t find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won\u0027t start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4067",
"url": "https://www.suse.com/security/cve/CVE-2024-4067"
},
{
"category": "external",
"summary": "SUSE Bug 1224255 for CVE-2024-4067",
"url": "https://bugzilla.suse.com/1224255"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-4067"
},
{
"cve": "CVE-2024-4068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4068"
}
],
"notes": [
{
"category": "general",
"text": "The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4068",
"url": "https://www.suse.com/security/cve/CVE-2024-4068"
},
{
"category": "external",
"summary": "SUSE Bug 1224256 for CVE-2024-4068",
"url": "https://bugzilla.suse.com/1224256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-4068"
},
{
"cve": "CVE-2024-42459",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42459"
}
],
"notes": [
{
"category": "general",
"text": "In the Elliptic package 6.5.6 for Node.js, EDDSA signature malleability occurs because there is a missing signature length check, and thus zero-valued bytes can be removed or appended.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42459",
"url": "https://www.suse.com/security/cve/CVE-2024-42459"
},
{
"category": "external",
"summary": "SUSE Bug 1232538 for CVE-2024-42459",
"url": "https://bugzilla.suse.com/1232538"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-42459"
},
{
"cve": "CVE-2024-42460",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42460"
}
],
"notes": [
{
"category": "general",
"text": "In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42460",
"url": "https://www.suse.com/security/cve/CVE-2024-42460"
},
{
"category": "external",
"summary": "SUSE Bug 1232538 for CVE-2024-42460",
"url": "https://bugzilla.suse.com/1232538"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-42460"
},
{
"cve": "CVE-2024-42461",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42461"
}
],
"notes": [
{
"category": "general",
"text": "In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because BER-encoded signatures are allowed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42461",
"url": "https://www.suse.com/security/cve/CVE-2024-42461"
},
{
"category": "external",
"summary": "SUSE Bug 1232538 for CVE-2024-42461",
"url": "https://bugzilla.suse.com/1232538"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-42461"
},
{
"cve": "CVE-2024-45296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-45296"
}
],
"notes": [
{
"category": "general",
"text": "path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-45296",
"url": "https://www.suse.com/security/cve/CVE-2024-45296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-45296"
},
{
"cve": "CVE-2024-45338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-45338"
}
],
"notes": [
{
"category": "general",
"text": "An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-45338",
"url": "https://www.suse.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "SUSE Bug 1234794 for CVE-2024-45338",
"url": "https://bugzilla.suse.com/1234794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-45338"
},
{
"cve": "CVE-2024-45811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-45811"
}
],
"notes": [
{
"category": "general",
"text": "Vite a frontend build tooling framework for javascript. In affected versions the contents of arbitrary files can be returned to the browser. `@fs` denies access to files outside of Vite serving allow list. Adding `?import\u0026raw` to the URL bypasses this limitation and returns the file content if it exists. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-45811",
"url": "https://www.suse.com/security/cve/CVE-2024-45811"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-45811"
},
{
"cve": "CVE-2024-45812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-45812"
}
],
"notes": [
{
"category": "general",
"text": "Vite a frontend build tooling framework for javascript. Affected versions of vite were discovered to contain a DOM Clobbering vulnerability when building scripts to `cjs`/`iife`/`umd` output format. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an img tag with an unsanitized name attribute) are present. DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. We have identified a DOM Clobbering vulnerability in Vite bundled scripts, particularly when the scripts dynamically import other scripts from the assets folder and the developer sets the build output format to `cjs`, `iife`, or `umd`. In such cases, Vite replaces relative paths starting with `__VITE_ASSET__` using the URL retrieved from `document.currentScript`. However, this implementation is vulnerable to a DOM Clobbering attack. The `document.currentScript` lookup can be shadowed by an attacker via the browser\u0027s named DOM tree element access mechanism. This manipulation allows an attacker to replace the intended script element with a malicious HTML element. When this happens, the src attribute of the attacker-controlled element is used as the URL for importing scripts, potentially leading to the dynamic loading of scripts from an attacker-controlled server. This vulnerability can result in cross-site scripting (XSS) attacks on websites that include Vite-bundled files (configured with an output format of `cjs`, `iife`, or `umd`) and allow users to inject certain scriptless HTML tags without properly sanitizing the name or id attributes. This issue has been patched in versions 5.4.6, 5.3.6, 5.2.14, 4.5.5, and 3.2.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-45812",
"url": "https://www.suse.com/security/cve/CVE-2024-45812"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-45812"
},
{
"cve": "CVE-2024-47068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47068"
}
],
"notes": [
{
"category": "general",
"text": "Rollup is a module bundler for JavaScript. Versions prior to 2.79.2, 3.29.5, and 4.22.4 are susceptible to a DOM Clobbering vulnerability when bundling scripts with properties from `import.meta` (e.g., `import.meta.url`) in `cjs`/`umd`/`iife` format. The DOM Clobbering gadget can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Versions 2.79.2, 3.29.5, and 4.22.4 contain a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47068",
"url": "https://www.suse.com/security/cve/CVE-2024-47068"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-47068"
},
{
"cve": "CVE-2024-47875",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47875"
}
],
"notes": [
{
"category": "general",
"text": "DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47875",
"url": "https://www.suse.com/security/cve/CVE-2024-47875"
},
{
"category": "external",
"summary": "SUSE Bug 1231571 for CVE-2024-47875",
"url": "https://bugzilla.suse.com/1231571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-47875"
},
{
"cve": "CVE-2024-48948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-48948"
}
],
"notes": [
{
"category": "general",
"text": "The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve\u0027s base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-48948",
"url": "https://www.suse.com/security/cve/CVE-2024-48948"
},
{
"category": "external",
"summary": "SUSE Bug 1231681 for CVE-2024-48948",
"url": "https://bugzilla.suse.com/1231681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-48948"
},
{
"cve": "CVE-2024-48949",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-48949"
}
],
"notes": [
{
"category": "general",
"text": "The verify function in lib/elliptic/eddsa/index.js in the Elliptic package before 6.5.6 for Node.js omits \"sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()\" validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-48949",
"url": "https://www.suse.com/security/cve/CVE-2024-48949"
},
{
"category": "external",
"summary": "SUSE Bug 1231557 for CVE-2024-48949",
"url": "https://bugzilla.suse.com/1231557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-48949"
},
{
"cve": "CVE-2024-51744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-51744"
}
],
"notes": [
{
"category": "general",
"text": "golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in \"dangerous\" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors (\"dangerous\" ones first), so that you are not running in the case detailed above.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-51744",
"url": "https://www.suse.com/security/cve/CVE-2024-51744"
},
{
"category": "external",
"summary": "SUSE Bug 1232936 for CVE-2024-51744",
"url": "https://bugzilla.suse.com/1232936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2024-51744"
},
{
"cve": "CVE-2024-55565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-55565"
}
],
"notes": [
{
"category": "general",
"text": "nanoid (aka Nano ID) before 5.0.9 mishandles non-integer values. 3.3.8 is also a fixed version.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-55565",
"url": "https://www.suse.com/security/cve/CVE-2024-55565"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-55565"
},
{
"cve": "CVE-2024-6104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-6104"
}
],
"notes": [
{
"category": "general",
"text": "go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-6104",
"url": "https://www.suse.com/security/cve/CVE-2024-6104"
},
{
"category": "external",
"summary": "SUSE Bug 1227024 for CVE-2024-6104",
"url": "https://bugzilla.suse.com/1227024"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.aarch64",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.ppc64le",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.s390x",
"openSUSE Tumbleweed:velociraptor-0.7.0.4.git142.862ef23-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-6104"
}
]
}
RHSA-2024:4702
Vulnerability from csaf_redhat - Published: 2024-07-25 14:32 - Updated: 2026-03-18 16:23A flaw was found in the gorilla/schema package. Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could trigger memory exhaustion and lead to a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64 | — |
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le | — |
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x | — |
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src | — |
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64 | — |
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.src | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-doc-0:5.14.0-284.75.1.el9_2.noarch | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.aarch64 | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.ppc64le | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.s390x | — |
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.x86_64 | — |
Workaround
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2024:4702 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2295010 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2024-37298 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2295010 | external |
| https://www.cve.org/CVERecord?id=CVE-2024-37298 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2024-37298 | external |
| https://github.com/gorilla/schema/blob/main/decod… | external |
| https://github.com/gorilla/schema/commit/cd59f2f1… | external |
| https://github.com/gorilla/schema/security/adviso… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.15.23 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.15.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.15.23. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2024:4699\n\nSecurity Fix(es):\n\n* gorilla/schema: Potential memory exhaustion attack due to sparse slice\ndeserialization (CVE-2024-37298)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.15 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.15/updating/updating_a_cluster/updating-cluster-cli.html",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4702",
"url": "https://access.redhat.com/errata/RHSA-2024:4702"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2295010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4702.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.15.23 packages and security update",
"tracking": {
"current_release_date": "2026-03-18T16:23:45+00:00",
"generator": {
"date": "2026-03-18T16:23:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2024:4702",
"initial_release_date": "2024-07-25T14:32:28+00:00",
"revision_history": [
{
"date": "2024-07-25T14:32:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-25T14:32:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T16:23:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.15",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.15::el9"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.15",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.15::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.src",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.src",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el9?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.75.1.el9_2.src",
"product": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.src",
"product_id": "kernel-0:5.14.0-284.75.1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.75.1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src",
"product": {
"name": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src",
"product_id": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.75.1.rt14.360.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.src",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.src",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el8?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_id": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.75.1.el9_2.x86_64",
"product": {
"name": "bpftool-0:7.0.0-284.75.1.el9_2.x86_64",
"product_id": "bpftool-0:7.0.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-partner@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-uki-virt@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-partner@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-uki-virt@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "perf-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "perf-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "python3-perf-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "rtla-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "rtla-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64",
"product_id": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.75.1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel-matched@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-partner@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel-matched@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-core@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-internal@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-partner@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-284.75.1.rt14.360.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"product_id": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_id": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"product": {
"name": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"product_id": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_id": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.75.1.el9_2.aarch64",
"product": {
"name": "bpftool-0:7.0.0-284.75.1.el9_2.aarch64",
"product_id": "bpftool-0:7.0.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-core@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-core@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-devel@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-devel-matched@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-core@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-extra@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-internal@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-partner@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-devel@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-devel-matched@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-core@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-extra@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-internal@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-partner@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-partner@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-partner@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "perf-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "perf-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "python3-perf-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "rtla-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "rtla-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64",
"product_id": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-debuginfo@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debuginfo@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.75.1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_id": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "bpftool-0:7.0.0-284.75.1.el9_2.ppc64le",
"product_id": "bpftool-0:7.0.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-partner@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-ipaclones-internal@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-partner@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "rtla-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "rtla-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le",
"product_id": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.75.1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_id": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-25.2.rhaos4.15.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:7.0.0-284.75.1.el9_2.s390x",
"product": {
"name": "bpftool-0:7.0.0-284.75.1.el9_2.s390x",
"product_id": "bpftool-0:7.0.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@7.0.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-internal@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-partner@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-devel-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-modules-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-internal@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-partner@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-selftests-internal@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-tools-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-core@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-partner@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "perf-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "perf-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "python3-perf-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rtla-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "rtla-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "rtla-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x",
"product_id": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@7.0.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-284.75.1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_id": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-25.2.rhaos4.15.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x",
"product": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x",
"product_id": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openshift-clients@4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch",
"product": {
"name": "podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch",
"product_id": "podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.4.1-25.2.rhaos4.15.el9?arch=noarch\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-284.75.1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-284.75.1.el9_2.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-284.75.1.el9_2.noarch",
"product_id": "kernel-doc-0:5.14.0-284.75.1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-284.75.1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch",
"product": {
"name": "podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch",
"product_id": "podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.4.1-25.2.rhaos4.15.el8?arch=noarch\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.src as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.src"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch"
},
"product_reference": "podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64"
},
"product_reference": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le"
},
"product_reference": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x"
},
"product_reference": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64"
},
"product_reference": "podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.aarch64"
},
"product_reference": "bpftool-0:7.0.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "bpftool-0:7.0.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.s390x"
},
"product_reference": "bpftool-0:7.0.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:7.0.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.x86_64"
},
"product_reference": "bpftool-0:7.0.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.src as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.src"
},
"product_reference": "kernel-0:5.14.0-284.75.1.el9_2.src",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-core-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-284.75.1.el9_2.noarch as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-doc-0:5.14.0-284.75.1.el9_2.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-284.75.1.el9_2.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src"
},
"product_reference": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64"
},
"product_reference": "kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64"
},
"product_reference": "openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "perf-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "perf-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "perf-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.src as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.src"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch"
},
"product_reference": "podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64"
},
"product_reference": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le"
},
"product_reference": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x"
},
"product_reference": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
},
"product_reference": "podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "python3-perf-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.75.1.el9_2.aarch64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.aarch64"
},
"product_reference": "rtla-0:5.14.0-284.75.1.el9_2.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.75.1.el9_2.ppc64le as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.ppc64le"
},
"product_reference": "rtla-0:5.14.0-284.75.1.el9_2.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.75.1.el9_2.s390x as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.s390x"
},
"product_reference": "rtla-0:5.14.0-284.75.1.el9_2.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:5.14.0-284.75.1.el9_2.x86_64 as a component of Red Hat OpenShift Container Platform 4.15",
"product_id": "9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.x86_64"
},
"product_reference": "rtla-0:5.14.0-284.75.1.el9_2.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37298",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-07-01T19:21:12+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.src",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-doc-0:5.14.0-284.75.1.el9_2.noarch",
"9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src",
"9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2295010"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the gorilla/schema package. Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could trigger memory exhaustion and lead to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in the gorilla/schema package is a high-severity issue due to its potential to cause a Denial of Service (DoS) attack through memory exhaustion. The schema.Decoder.Decode() function, when processing a struct with fields of type []struct{...}, is susceptible to malicious input that exploits sparse slice functionality. This can result in excessive memory allocations, overwhelming the system\u0027s resources and rendering the application unresponsive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.src",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.src",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
],
"known_not_affected": [
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.src",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-doc-0:5.14.0-284.75.1.el9_2.noarch",
"9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src",
"9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37298"
},
{
"category": "external",
"summary": "RHBZ#2295010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37298"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37298",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37298"
},
{
"category": "external",
"summary": "https://github.com/gorilla/schema/blob/main/decoder.go#L223",
"url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223"
},
{
"category": "external",
"summary": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff",
"url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff"
},
{
"category": "external",
"summary": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3",
"url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3"
}
],
"release_date": "2024-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-25T14:32:28+00:00",
"details": "For OpenShift Container Platform 4.15 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.15/release_notes/ocp-4-15-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.src",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.src",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4702"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.src",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.src",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-doc-0:5.14.0-284.75.1.el9_2.noarch",
"9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src",
"9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.src",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.aarch64",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.ppc64le",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.s390x",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.src",
"8Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el8.x86_64",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.src",
"8Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-catatonit-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-catatonit-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el8.noarch",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.aarch64",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.ppc64le",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.s390x",
"8Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el8.x86_64",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:bpftool-0:7.0.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:bpftool-debuginfo-0:7.0.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.src",
"9Base-RHOSE-4.15:kernel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-64k-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-64k-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-abi-stablelists-0:5.14.0-284.75.1.el9_2.noarch",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debug-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debug-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-debuginfo-common-aarch64-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-debuginfo-common-ppc64le-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-debuginfo-common-s390x-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-debuginfo-common-x86_64-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-devel-matched-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-doc-0:5.14.0-284.75.1.el9_2.noarch",
"9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-ipaclones-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-core-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-extra-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-modules-partner-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.src",
"9Base-RHOSE-4.15:kernel-rt-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debug-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debuginfo-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-debuginfo-common-x86_64-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-devel-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-devel-matched-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-kvm-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-core-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-extra-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-modules-partner-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-rt-selftests-internal-0:5.14.0-284.75.1.rt14.360.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-selftests-internal-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-tools-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-tools-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-libs-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:kernel-tools-libs-devel-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-uki-virt-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:kernel-zfcpdump-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-devel-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-devel-matched-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-core-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-extra-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-internal-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:kernel-zfcpdump-modules-partner-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.aarch64",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.ppc64le",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.s390x",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.src",
"9Base-RHOSE-4.15:openshift-clients-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.15:openshift-clients-redistributable-0:4.15.0-202407120337.p0.g1e41aa3.assembly.stream.el9.x86_64",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:perf-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.src",
"9Base-RHOSE-4.15:podman-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-debugsource-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-docker-3:4.4.1-25.2.rhaos4.15.el9.noarch",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-gvproxy-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-gvproxy-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-plugins-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-plugins-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-remote-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-remote-debuginfo-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.aarch64",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.ppc64le",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.s390x",
"9Base-RHOSE-4.15:podman-tests-3:4.4.1-25.2.rhaos4.15.el9.x86_64",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:python3-perf-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:python3-perf-debuginfo-0:5.14.0-284.75.1.el9_2.x86_64",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.aarch64",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.ppc64le",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.s390x",
"9Base-RHOSE-4.15:rtla-0:5.14.0-284.75.1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization"
}
]
}
RHSA-2024:4825
Vulnerability from csaf_redhat - Published: 2024-07-24 12:58 - Updated: 2026-03-18 16:23A flaw was found in the gorilla/schema package. Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could trigger memory exhaustion and lead to a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-docker-2:4.2.0-5.el9_0.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.x86_64 | — |
Vendor Fix
fix
Workaround
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2024:4825 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2295010 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2024-37298 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2295010 | external |
| https://www.cve.org/CVERecord?id=CVE-2024-37298 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2024-37298 | external |
| https://github.com/gorilla/schema/blob/main/decod… | external |
| https://github.com/gorilla/schema/commit/cd59f2f1… | external |
| https://github.com/gorilla/schema/security/adviso… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for podman is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization (CVE-2024-37298)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4825",
"url": "https://access.redhat.com/errata/RHSA-2024:4825"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2295010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4825.json"
}
],
"title": "Red Hat Security Advisory: podman security update",
"tracking": {
"current_release_date": "2026-03-18T16:23:46+00:00",
"generator": {
"date": "2026-03-18T16:23:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2024:4825",
"initial_release_date": "2024-07-24T12:58:51+00:00",
"revision_history": [
{
"date": "2024-07-24T12:58:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-24T12:58:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T16:23:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-2:4.2.0-5.el9_0.src",
"product": {
"name": "podman-2:4.2.0-5.el9_0.src",
"product_id": "podman-2:4.2.0-5.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-5.el9_0?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-catatonit-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-catatonit-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-gvproxy-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-gvproxy-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-plugins-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-plugins-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-remote-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-remote-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-tests-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-tests-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-tests-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-debugsource-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-debugsource-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product": {
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_id": "podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-5.el9_0?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-catatonit-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-catatonit-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-gvproxy-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-gvproxy-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-plugins-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-plugins-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-remote-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-remote-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-tests-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-tests-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-tests-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-debugsource-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-debugsource-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product": {
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_id": "podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-5.el9_0?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-catatonit-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-catatonit-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-gvproxy-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-gvproxy-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-plugins-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-plugins-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-remote-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-remote-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-tests-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-tests-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-tests-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-debugsource-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-debugsource-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product": {
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_id": "podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-5.el9_0?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-catatonit-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-catatonit-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-gvproxy-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-gvproxy-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-plugins-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-plugins-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-remote-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-remote-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-tests-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-tests-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-tests-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-debugsource-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-debugsource-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x",
"product": {
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_id": "podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-5.el9_0?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-2:4.2.0-5.el9_0.noarch",
"product": {
"name": "podman-docker-2:4.2.0-5.el9_0.noarch",
"product_id": "podman-docker-2:4.2.0-5.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.2.0-5.el9_0?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-5.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.src"
},
"product_reference": "podman-2:4.2.0-5.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-catatonit-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-catatonit-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-catatonit-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-catatonit-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-debuginfo-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-debuginfo-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-debuginfo-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-debugsource-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-debugsource-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-debugsource-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-debugsource-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-2:4.2.0-5.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-docker-2:4.2.0-5.el9_0.noarch"
},
"product_reference": "podman-docker-2:4.2.0-5.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-gvproxy-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-gvproxy-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-gvproxy-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-gvproxy-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-plugins-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-plugins-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-plugins-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-plugins-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-remote-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-remote-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-remote-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-remote-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-2:4.2.0-5.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.aarch64"
},
"product_reference": "podman-tests-2:4.2.0-5.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-2:4.2.0-5.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.ppc64le"
},
"product_reference": "podman-tests-2:4.2.0-5.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-2:4.2.0-5.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.s390x"
},
"product_reference": "podman-tests-2:4.2.0-5.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-2:4.2.0-5.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.x86_64"
},
"product_reference": "podman-tests-2:4.2.0-5.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37298",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-07-01T19:21:12+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2295010"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the gorilla/schema package. Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could trigger memory exhaustion and lead to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in the gorilla/schema package is a high-severity issue due to its potential to cause a Denial of Service (DoS) attack through memory exhaustion. The schema.Decoder.Decode() function, when processing a struct with fields of type []struct{...}, is susceptible to malicious input that exploits sparse slice functionality. This can result in excessive memory allocations, overwhelming the system\u0027s resources and rendering the application unresponsive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.src",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-docker-2:4.2.0-5.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37298"
},
{
"category": "external",
"summary": "RHBZ#2295010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37298"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37298",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37298"
},
{
"category": "external",
"summary": "https://github.com/gorilla/schema/blob/main/decoder.go#L223",
"url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223"
},
{
"category": "external",
"summary": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff",
"url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff"
},
{
"category": "external",
"summary": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3",
"url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3"
}
],
"release_date": "2024-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-24T12:58:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.src",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-docker-2:4.2.0-5.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4825"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.src",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-docker-2:4.2.0-5.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.src",
"AppStream-9.0.0.Z.E4S:podman-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-catatonit-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-catatonit-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-debugsource-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-docker-2:4.2.0-5.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-gvproxy-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-plugins-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-plugins-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-remote-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-remote-debuginfo-2:4.2.0-5.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:podman-tests-2:4.2.0-5.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization"
}
]
}
RHSA-2024:4848
Vulnerability from csaf_redhat - Published: 2024-07-31 14:49 - Updated: 2026-03-18 16:23A flaw was found in the gorilla/schema package. Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could trigger memory exhaustion and lead to a denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64 | — |
Vendor Fix
fix
Workaround
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2024:4848 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2294000 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2295010 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2024-37298 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2295010 | external |
| https://www.cve.org/CVERecord?id=CVE-2024-37298 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2024-37298 | external |
| https://github.com/gorilla/schema/blob/main/decod… | external |
| https://github.com/gorilla/schema/commit/cd59f2f1… | external |
| https://github.com/gorilla/schema/security/adviso… | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.13.46 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.13.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\nSecurity Fix(es):\n\n* gorilla/schema: Potential memory exhaustion attack due to sparse slice\ndeserialization (CVE-2024-37298)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s)\nlisted in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:4848",
"url": "https://access.redhat.com/errata/RHSA-2024:4848"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2294000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294000"
},
{
"category": "external",
"summary": "2295010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295010"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4848.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.13.46 security update",
"tracking": {
"current_release_date": "2026-03-18T16:23:47+00:00",
"generator": {
"date": "2026-03-18T16:23:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2024:4848",
"initial_release_date": "2024-07-31T14:49:20+00:00",
"revision_history": [
{
"date": "2024-07-31T14:49:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-07-31T14:49:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-18T16:23:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.13",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.13::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.13",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.13::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.src",
"product": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.src",
"product_id": "podman-3:4.4.1-9.3.rhaos4.13.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-9.3.rhaos4.13.el8?arch=src\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.src",
"product": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.src",
"product_id": "podman-3:4.4.1-10.3.rhaos4.13.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-10.3.rhaos4.13.el9?arch=src\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_id": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_id": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=x86_64\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_id": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_id": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=aarch64\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_id": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=ppc64le\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_id": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-9.3.rhaos4.13.el8?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product": {
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_id": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-10.3.rhaos4.13.el9?arch=s390x\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch",
"product": {
"name": "podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch",
"product_id": "podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.4.1-9.3.rhaos4.13.el8?arch=noarch\u0026epoch=3"
}
}
},
{
"category": "product_version",
"name": "podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch",
"product": {
"name": "podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch",
"product_id": "podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.4.1-10.3.rhaos4.13.el9?arch=noarch\u0026epoch=3"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.src as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.src"
},
"product_reference": "podman-3:4.4.1-9.3.rhaos4.13.el8.src",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch"
},
"product_reference": "podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64"
},
"product_reference": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le"
},
"product_reference": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x"
},
"product_reference": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64"
},
"product_reference": "podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"relates_to_product_reference": "8Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.src as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.src"
},
"product_reference": "podman-3:4.4.1-10.3.rhaos4.13.el9.src",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch"
},
"product_reference": "podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64"
},
"product_reference": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le"
},
"product_reference": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x"
},
"product_reference": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"relates_to_product_reference": "9Base-RHOSE-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.13",
"product_id": "9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
},
"product_reference": "podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"relates_to_product_reference": "9Base-RHOSE-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37298",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2024-07-01T19:21:12+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2295010"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the gorilla/schema package. Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could trigger memory exhaustion and lead to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in the gorilla/schema package is a high-severity issue due to its potential to cause a Denial of Service (DoS) attack through memory exhaustion. The schema.Decoder.Decode() function, when processing a struct with fields of type []struct{...}, is susceptible to malicious input that exploits sparse slice functionality. This can result in excessive memory allocations, overwhelming the system\u0027s resources and rendering the application unresponsive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.src",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.src",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-37298"
},
{
"category": "external",
"summary": "RHBZ#2295010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-37298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37298"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37298",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37298"
},
{
"category": "external",
"summary": "https://github.com/gorilla/schema/blob/main/decoder.go#L223",
"url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223"
},
{
"category": "external",
"summary": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff",
"url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff"
},
{
"category": "external",
"summary": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3",
"url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3"
}
],
"release_date": "2024-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-07-31T14:49:20+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html",
"product_ids": [
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.src",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.src",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:4848"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.src",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.src",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.src",
"8Base-RHOSE-4.13:podman-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-catatonit-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-catatonit-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-debugsource-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-docker-3:4.4.1-9.3.rhaos4.13.el8.noarch",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-plugins-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-remote-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.aarch64",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.ppc64le",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.s390x",
"8Base-RHOSE-4.13:podman-tests-3:4.4.1-9.3.rhaos4.13.el8.x86_64",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.src",
"9Base-RHOSE-4.13:podman-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-debugsource-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-docker-3:4.4.1-10.3.rhaos4.13.el9.noarch",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-gvproxy-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-gvproxy-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-plugins-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-plugins-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-remote-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-remote-debuginfo-3:4.4.1-10.3.rhaos4.13.el9.x86_64",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.aarch64",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.ppc64le",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.s390x",
"9Base-RHOSE-4.13:podman-tests-3:4.4.1-10.3.rhaos4.13.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gorilla/schema: Potential memory exhaustion attack due to sparse slice deserialization"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.